Rachana et al., 2021 - Google Patents
Detection of Malicious Content or Web Links Related to CyberfraudsRachana et al., 2021
View PDF- Document ID
- 3003471834568909864
- Author
- Rachana G
- Nandakishor B
- Publication year
External Links
Snippet
Malicious URLs are being extensively used to mount numerous cyber attacks together with spamming, phishing and malware. Detection of malicious URLs and identification of threat sorts lead to critical stage in these attacks. Knowing the kind of a threat permits estimation of …
- 238000001514 detection method 0 title abstract description 18
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10243991B2 (en) | Methods and systems for generating dashboards for displaying threat insight information | |
US10601865B1 (en) | Detection of credential spearphishing attacks using email analysis | |
EP2859495B1 (en) | Malicious message detection and processing | |
Patil et al. | Survey on malicious web pages detection techniques | |
Alkawaz et al. | Detecting phishing website using machine learning | |
Marchal et al. | Proactive discovery of phishing related domain names | |
US8707426B1 (en) | Method and apparatus for resolving a cousin domain name to detect web-based fraud | |
US12021894B2 (en) | Phishing detection based on modeling of web page content | |
CN112567707A (en) | Enhanced techniques for generating and deploying dynamic false user accounts | |
Bhardwaj et al. | Privacy-aware detection framework to mitigate new-age phishing attacks | |
EP3888335A1 (en) | Phishing protection methods and systems | |
US10505979B2 (en) | Detection and warning of imposter web sites | |
Sankhwar et al. | Email phishing: an enhanced classification model to detect malicious urls | |
Dinesh et al. | Identification of phishing attacks using machine learning algorithm | |
Rahman et al. | Classification of spamming attacks to blogging websites and their security techniques | |
Rachana et al. | Detection of Malicious Content or Web Links Related to Cyberfrauds | |
Drury et al. | No phishing with the wrong bait: reducing the phishing risk by address separation | |
Mishra et al. | Prevention of phishing attack in internet-of-things based cyber-physical human system | |
Patel | Test utility for live and online testing of an anti-phishing message security system | |
Hariram | Detection of Clickjacking using Convolutional Neural Network | |
Almousa et al. | Anti-Spoofing in Medical Employee's Email using Machine Learning Uclassify Algorithm | |
Shahila et al. | AI Based Phishing Discrement for Immense E-Maildata | |
Abad et al. | Phishing Website Classification Using Features of Web Addresses and Web Pages | |
Thangammal et al. | Analysis Of Phishing Websites Using An Competent Feature-Based Framework | |
Fonseca | Identifying Malicious URLs: A Descriptive Pipeline for Analysis and Implementation |